Package: BSDgames
Version: 2.17-1


The vulnerabilities are caused due to boundary errors when reading
the player's name in pl_main.c

code segment:
printf("Your name, Captain? ");
                fflush(stdout);
                fgets(captain, sizeof captain, stdin);
                if (!*captain)
                        strcpy(captain, "no name");
                else
                    captain[strlen(captain) - 1] = '\0';
        }

Being captain initialized as: char captain[80].

There is some similar issues in Tetris, and Hack too.

This can be exploited by users to gain gid=games an then to cause a stack-based 
buffer overflow when
other users run the game, by modifying entries in a game file like scores in 
Tetris or Hack.

Successful exploitation allows the execution of arbitrary code with
the privileges of other users.

Well... english isnt my first language and i dont know if the bugs can be 
reported in spanish so i hope to be understandeable


Anibal L. Sacco



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to